Open kurtfoster opened 6 years ago
Thanks for this @kurtfoster There is also #65 which covers another idea of this.
Will definitely look into Vault and check how we can use that in a PaaS enviornment where multiple clients need access to the Vault but should not have access to each others Secrets
it looks to me that git-secret is something worth consideration.
Had a meeting today with @thom8 and @markxtji
We discussed a couple of ideas, and the current working idea is:
with this setup we should be able to save secrets via the vault
local CLI and load them inside containers, this would not really be a multi-tenant system or so, but a good start
Future things to implement:
I would recommend looking at the CoreOS vault operator - https://github.com/coreos/vault-operator
This way you could have your helm charts include a vault resource, and with RBAC rules and service accounts you could have isolation of vaults to their particular environment.
Unsealing is still a bit of a pain, but I've seen a lot recommendations to use https://github.com/jetstack/vault-unsealer on hn.
As discussing with another client, we could also use Keycloak for secrets management?
Hi Michael, has there been any further progress on this secrets storage system?
We're also interested in a supported solution.
This might be interesting for you https://github.com/banzaicloud/bank-vaults
This might be interesting for you https://github.com/banzaicloud/bank-vaults
thanks @Opswatch ! will have a look :)
we talked about this again during lagoon tech sync:
Vault might no longer be a good fit for Lagoon due to the license changes that happened. Building this directly in Lagoon would be an option that solves this.
Currently it's not possible to store secret environment variables across an entire OpenShift project. Each new environment that is created for a new PR or branch needs to have ENV vars set manually in the deployment. Could we move to Vault to manage this instead of env?
Based on some investigations in our project, the following steps outline what may be needed to achieve a production level integration of Vault.
Install Consul.
Install Vault.
Install the Goldfish Vault Web UI.
Configure the Vault Kubernetes Auth Backend.
For each application that is to use Vault stored secrets.